Logo
NEWS

2017 infosecurity predictions

  • Published in

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the rise of ransomware to the Shadow Brokers, 2016 was an exciting year for the cyber security community, according to RiskIQ.

Read More

UK organisations paralysed by cyber security landscape need to get fundamentals right first

  • Published in

Research reveals UK organisations overwhelmingly using unsupported IT systems.

Read More

NEWS

Anomali Labs 2017 predictions

  • Published in

The past year has been a whirlwind tour of challenges and changes. Targeted threat activity took on a new emphasis by focusing on both disinformation and weaponised confidential information. Ransomware activity continued to grow and jumped to the OS X platform with the KeRanger malware. Also world policies have shifted towards protectionist strategies throughout the world. Based upon this environment I predict the following for the upcoming year and near term future. By Aaron...

Read More

Cyclance launches Channel programme

  • Published in

Building security expert community to deliver AI-based protection.

Read More

NEWS

Security does not equal maturity

  • Published in

Organisations spend an average of 5.6 per cent of the overall IT budget on IT security and risk management, according to the most recent IT Key Metrics Data from Gartner, Inc. However, IT security spending ranges from approximately 1 per cent to 13 per cent of the IT budget and is potentially a misleading indicator of programme success.

Read More

Gemalto to acquire 3M's Identity Management Business

  • Published in

This strategic acquisition rounds out Gemalto Government Programs offering by adding biometric technology and ideally positions the Company to provide solutions for the promising commercial biometrics market.

Read More

New research from email security firm Tessian reveals why people make mistakes, how blurred lines...
CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a...
“Everything shortage” this holiday season – creating perfect catalyst for cyber threats to...
Analysing your firm’s online habits is the first step towards bringing cyber security...
Resilient’s Incident Response Platform will enable Teva to respond faster and more...
BeyondTrust’s annual Privileged Access Threat Report highlights that greater visibility and...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more